In the face of rich game resources, it is necessary to have a good tool to manage games and improve the user's game experience. This is the meaning of the game platform. The game platform described in this paper a...
详细信息
In the face of rich game resources, it is necessary to have a good tool to manage games and improve the user's game experience. This is the meaning of the game platform. The game platform described in this paper adopts java technology, and uses C/S mode and My SQL database to complete the design of the platform. This game platform has the functions of login module, management module and so on. Through the platform, it can realize jigsaw puzzle, Snake game and real-time battle of LAN tank war game. The paper describes in detail the early preparation, overall design, specific implementation and functional testing of the game platform. All functions of the platform can be used normally, the game can also run normally under the rules, which has completed the requirements.
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommu...
详细信息
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the java programming language. JDK 1.7 as the java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the java compiler. Eclipse, a java SDK and the Android SDK as a java source code editor.
Source Code Summarization is the task of writing short, natural language descriptions of source code. The main use for these descriptions is in software documentation e.g. the one-sentence java method descriptions in ...
详细信息
Performance bugs, i.e., program source code that is unnecessarily inefficient, have received significant attention by the research community in recent years. A number of empirical studies have investigated how these b...
详细信息
ISBN:
(纸本)9781728149837
Performance bugs, i.e., program source code that is unnecessarily inefficient, have received significant attention by the research community in recent years. A number of empirical studies have investigated how these bugs differ from "ordinary" bugs that cause functional deviations and several approaches to aid their detection, localization, and removal have been proposed. Many of these approaches focus on certain subclasses of performance bugs, e.g., those resulting from redundant computations or unnecessary synchronization, and the evaluation of their effectiveness is usually limited to a small number of known instances of these bugs. To provide researchers working on performance bug detection and localization techniques with a larger corpus of performance bugs to evaluate against, we conduct a study of more than 700 performance bug fixing commits across 13 popular open source projects written in C and C++ and investigate the relative frequency of bug types as well as their complexity. Our results show that many of these fixes follow a small set of bug patterns, that they are contributed by experienced developers, and that the number of lines needed to fix performance bugs is highly project dependent.
Automatic Software Repair (APR) has significant potential to reduce software maintenance costs by reducing the human effort required to localize and fix bugs. State-of-the-art generate-and-validate APR techniques sele...
详细信息
ISBN:
(纸本)9781538649695
Automatic Software Repair (APR) has significant potential to reduce software maintenance costs by reducing the human effort required to localize and fix bugs. State-of-the-art generate-and-validate APR techniques select between and instantiate various mutation operators to construct candidate patches, informed largely by heuristic probability distributions. This may reduce effectiveness in terms of both efficiency and output quality. In practice, human developers have many options in terms of how to edit code to fix bugs, some of which are far more common than others (e.g., deleting a line of code is more common than adding a new class). We mined the most recent 100 bug-fixing commits from each of the 500 most popular java projects in GitHub (the largest dataset to date) to create a probabilistic model describing edit distributions. We categorize, compare and evaluate the different mutation operators used in state-of-the-art approaches. We find that a probabilistic model-based APR approach patches bugs more quickly in the majority of bugs studied, and that the resulting patches are of higher quality than those produced by previous approaches. Finally, we mine association rules for multi-edit source code changes, an understudied but important problem. We validate the association rules by analyzing how much of our corpus can be built from them. Our evaluation indicates that 84.6% of the multi-edit patches from the corpus can be built from the association rules, while maintaining 90% confidence.
The paper deals with the principles of constructing a simulation model for studying the basic processes and devices in the computer I / O subsystem. The procedure for selecting the composition of the studied character...
详细信息
ISBN:
(纸本)9781728167015
The paper deals with the principles of constructing a simulation model for studying the basic processes and devices in the computer I / O subsystem. The procedure for selecting the composition of the studied characteristics of input-output devices, as well as the structure and level of detail of the parameters of the objects under study is considered. Typical computer hardware with keyboard and monitor is offered as a peripheral device. When modeling, probabilistic characteristics of data processing in the input-output subsystem are set. The modeling program is developed in java in NetBeans 8.1. A user interface based on the animation of the processes in I / O subsystem is described. This provides obtaining a visual representation of interrupts, generation of control signals, and transfer of codes from peripheral devices to the memory and the central processor. The user interface provides the setting of the necessary modes and simulation parameters. The simulation results are presented in the form of time charts of devices and the numerical values of these characteristics. The input / output system under study can operate in one of three modes: only with information input, with data input and output to a monitor, and also only with data processing and output to a monitor. The paper presents the study results of the simulated system in various modes, confirming the adequacy of the developed model.
The Trusted Remote Function Interface (TRFI) is a small library that exposes services via a REST API to allow function execution with scientific programminglanguages. Functional units are uploaded to a remote server ...
详细信息
ISBN:
(纸本)9781728138862
The Trusted Remote Function Interface (TRFI) is a small library that exposes services via a REST API to allow function execution with scientific programminglanguages. Functional units are uploaded to a remote server using the provided REST API. The API stores registered functions for later execution. Maintaining code using this technique allows clients to repeatedly execute functions without having the native language, typically Octave or Python, installed on the client machine. A common problem in scientific applications is the requirement for a program to interface with scientific scripting languages. Typically, this is not a straightforward approach for accomplishing the data exchange and subsequent function execution on that data from popular languages such as java or javaScript. This task is extraordinarily cumbersome if the interpreter, used by the scientific programminglanguage, is not installed locally. By separating the function signature from the underlying implementation, and providing a uniform REST API, the TRFI library allows function interfacing in two ways. First, direct interfacing by using the equipped java library. Second, the more common scenario is interfacing remotely by deploying the library using aJAX-RS compatible web server. The result of the TRFI library's design and the provided REST API is the facilitation of code interoperability and reuse for scientific applications.
EvoSuite is an automated unit test generation tool for java. It takes as input a java class under test, and produces JUnit tests optimised for code coverage, and enhanced with regression assertions, as output. This pa...
详细信息
ISBN:
(纸本)9783319992419;9783319992402
EvoSuite is an automated unit test generation tool for java. It takes as input a java class under test, and produces JUnit tests optimised for code coverage, and enhanced with regression assertions, as output. This paper is a tutorial on how to use EvoSuite to generate tests, on how to build and extend EvoSuite, and how to use EvoSuite to run experiments on search-based testing.
Many research areas in software engineering, such as mutation testing, automatic repair, fault localization, and fault injection, rely on empirical knowledge about recurring bug-fixing code changes. Previous studies i...
详细信息
ISBN:
(纸本)9781728149837
Many research areas in software engineering, such as mutation testing, automatic repair, fault localization, and fault injection, rely on empirical knowledge about recurring bug-fixing code changes. Previous studies in this field focus on what has been changed due to bug-fixes, such as in terms of code edit actions. However, such studies did not consider where the bug-fix change was made (i.e., the context of the change), but knowing about the context can potentially narrow the search space for many software engineering techniques (e.g., by focusing mutation only on specific parts of the software). Furthermore, most previous work on bug-fixing changes focused on C and java projects, but there is little empirical evidence about Python software. Therefore, in this paper we perform a thorough empirical analysis of bug-fixing changes in three OpenStack projects, focusing on both the what and the where of the changes. We observed that all the recurring change patterns are not oblivious with respect to the surrounding code, but tend to occur in specific code contexts.
Identification of de novo indels from whole genome or exome sequencing data of parent-offspring trios is a challenging task in human disease studies and clinical practices. Existing computational approaches usually yi...
详细信息
ISBN:
(纸本)9781728118680
Identification of de novo indels from whole genome or exome sequencing data of parent-offspring trios is a challenging task in human disease studies and clinical practices. Existing computational approaches usually yield high false positive rate. In this study, we developed a gradient boosting approach for filtering de novo indels obtained by any computational approaches. Through application on the real genome sequencing data, our approach showed it could significantly reduce the false positive rate of de novo indels without a significant compromise on sensitivity. The software DNMFilter_Indel was written in a combination of java and R and freely available from the website at .
暂无评论